What does OSINT stand for?
Open-Source Intelligence
What is OPSEC?
operational security – the practice of hiding yourself online by disassociating your online persona with your real self
What is a public exposure assessment?
How is OSINT useful to attackes?
aids in potentially effective social-engineering attacks, and spear-phishing email campaigns to be conducted, tailored to their intended targets to make them more believable
What is the process of collecting publically available information for malicious purposes commonly referred to?
target information gathering, or passive information gathering (because the attacker is not directly engaging with the target’s systems, such as port or vulnerability scanning)
Which roles utilize OSINT?
How does a Tactical Threat Analyst utilize OSINT?
How does a Strategic Threat Analyst utilize OSINT?
How does a Security Analyst utilize OSINT?
How does a Vulnerability Analyst utilize OSINT?
How does a Penetration Tester/Red Teamer utilize OSINT?
gain information about their target company, such as internal systems and employee information
What does the The Intelligence Cycle term describe?
a series of stages and procedures that a researcher has to perform to convert the collected data and information into intelligence products capable of bringing solutions to the organization
What are the 5 steps in the The Intelligence Cycle?
What is determined in the Planning and Direction phase?
the purpose of research and what kind of information you are looking for
What is the objective of the Collection phase?
identification of which kind of processes you will use to carry out the collection of such information, and then, using all the techniques you know, obtain the data that will help you carry out your intelligence operation
What are the objectives in the Processing of data and information phase?
What is done in the Analysis to produce meaningful intelligence phase?
What is done in the Dissemination of intelligence to the clients phase?
deliver the product you developed throughout the process to the stakeholders (individuals or groups) that requested it
Why are the OSINT operations called a “passive operation”?
they are completely invisible and at no time will the individual or organization you are investigating realize who you are
What are the 3 techniques used for online fingerprinting?
What is Sock Puppetry?
a deceptive practice in which a single individual creates and controls multiple accounts or personas to manipulate or deceive others
What is the The Harvester tool used for?
command-line information-gathering tool that utilizes OSINT sources to gather information about the target domain and retrieves information such as hostnames, IP addresses, employees (and their positions), email addresses, and much more
How to use theharvester to do a simple reconnaissance on the domain google.com, using Google as the data source?
theharvester -d google.com -l 100 -b google
How to use theharvester to do a simple reconnaissance on the domain google.com, using LinkedIn as the data source?
theharvester -d google.com -l 100 -b linkedin